Different tests. Check your antivirus & antispyware software!

Trojan Simulator

For years you have been able to test your virus scanner with the harmless "Eicar" test file. Using the just released "Trojan Simulator" you can now test your trojan scanner in the same manner, using a harmless demonstration trojan. This is a risk-free way to see how your security software behaves in a real-world situation.
Download: TrojanSimulator.zip
Installation is simple: Simply unzip all files contained in TrojanSimulator.zip to any directory. To start, simply double-click TrojanSimulator.exe. How it works

When you run Trojan Simulator, you will be presented with a screen showing some informational text about Trojan Simulator. Clicking the Install button will install the demo trojan on your system. The demo trojan simulates a real trojan server by hiding its main window and writing an autostart entry to the registry. Clicking the Uninstall button removes the autostart entry from the registry and then unloads the demo trojan server from memory. While the demo trojan is running, you get a chance to observe the behavior of any installed security software. Technical details

When run with the /install parameter, TSServ.exe loads into memory and adds an autostart entry to the registry. An information dialog will pop up notifying that the demo server was successfully installed along with the path to the server and its process ID. Most trojans don't really present a dialog saying they've successfully installed themselves in your system! (Although many will present a fake error message to make it look like the executable file was corrupt or that some other problem occured that prevented the file from being run. In reality the trojan server is already running in memory when this dialog is shown.) When run with the /uninstall parameter, TSServ.exe removes its autostart entry and then unloads all copies of itself from memory. If you run TSServ.exe without any parameters, nothing will happen - the program simply starts and exits. Ways Trojan Simulator can be detected

When the Trojan Simulator server is installed, it will exist as an active process in memory. It will also have an autostart entry in the system registry. Most virus scanners are not that good at dealing with trojans, so it's likely that your virus scanner, if it detects the Trojan Simulator server, will neither be able to remove the process from memory nor be able to remove the registry entry. Any decent trojan scanner should take care of this if the server is detected. The demo trojan server can be detected on the system in the following ways:

By its file fingerprint. The demo trojan server file, named TSServ.exe, has a unique fingerprint that can be used by security software to detect its presence on a system. The file is packed with the executable packer UPX to reduce its size and to further simulate the behavior of a real trojan. Trojan servers are often packed to avoid detection by security software - see the note below for more information about this.

By its in-memory fingerprint. Once TSServ.exe gets loaded into memory, it has a unique fingerprint in its code section. This can be used by security software to detect its presence in memory. Even though the server file is packed with the UPX executable packer, it always exists in memory in unpacked form. This means the fingerprint won't be the same as for the file on disk, but it also means that this is the perfect opportunity to detect the server, should a file scan have missed it.

By the registry entry it creates TSServ.exe creates an autostart entry in the Windows registry, under the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Run. The name of the entry is "TrojanSimulator" (without the quotes), and its value is the path to TSServ.exe, enclosed in quotes ("), and followed by the /install parameter. The type of the entry is REG_SZ (standard registry string value).

PC FLANK TEST
" Test Your System"
Quick Test

This test shows how vulnerable your computer is to various Internet threats. The test also determines if a Trojan horse already infects your system and if your Web browser reveals personal info about you or your computer while you're web surfing.

The test takes less than five minutes, but provides the following:
Ports check

The test scans your system for open ports that can be used in attacks on your computer. Open ports let hackers access your system.

Trojan horse check

This test scans your system for any Trojan horses. If a Trojan is found on your computer the test recommends actions to take.

Privacy check

This checks if your browser reveals any of your personal information. This might be the sites you have visited, the region you live in, who your Internet Service Provider is, etc. The test will recommend specific settings of your browser for you to change.

This is a risk-free way to see how your security software behaves in a real-world situation.
Download: TrojanSimulator.zip [SNIP]

I like this part - it's always nice to have a new toy to play with. I didn't like the 'download-30-day-trial-now' part for Trojan Hunter, by the way, which sounds like advertising, which is not the purpose of this forum. I would appreciate it if you removed that link. Security products may be discussed or compared, but not plainly advertised on this forum.

EICAR & KASPERSKY LAB & IKARUS ANTIVIRUS TEST

EICAR FILE TEST!!

Test your Anti-Virus web protection by trying to download the following files.

Eicar file= is a standardized test file for signature based virus detection software. This file can be used to verify the correct operation of antivirus software
See below for more details.http://www.eicar.org/anti_virus_test_file.htm

All files are NOT viruses, but they appear to be viruses, therefore your Anti-Virus should stop the downloads.

If you can download any of these files, then your Anti-Virus is NOT effective! Just delete any file downloaded and empty Recycle Bin.

Same with Eicar , This is test is really for Ikarus Antivirus only & only Ikarus should stop the download!!

UNITYPRO AV TESTER

UnityPro AV Tester to the rescue! This freeware program allows you to SAFELY test your realtime Anti-Virus protection with a simple click of the button. Using the EICAR test pattern, AV Tester decrypts the test pattern in memory and attempts to write a file to the same folder where AV Tester is installed. If your Anti-Virus solution is watching, it will almost immediately go off, proving it is functioning properly.

REGTEST
RegTest is a program which will allow you to test the effectiveness of your registry protection. RegTest simulates malicious software which infect computers all around the world millions of times a day. RegTest will not harm your computer like malicious software would however, but will allow you to see some of the techniques advanced spyware, viruses and trojans use to infect your system without any harm.RegTest works on all Windows versions
The registry can be misused by malicious software so it is essential you have some protection for it. RegDefend protects against all attacks shown in this RegTest demonstration. RegTest performs 2 series of tests which effectively determines how good your registry protections are.Test 1 - This test works by modifying several autostart values in the registry then quickly rewriting the original contents. This test will determine whether or not the registry protection you have is quick enough to catch the change. If it is not then the fact is your registry can be modified without you knowing. Most registry programs simply poll/read the registry every few seconds which means they will never catch everything which is written. This can be abused by malware which simply keeps rewriting itself to the registry so that you every time your machine starts up, the worm/virus/trojan will start also. If your registry protection program is successful all registry items shown will not be able to be modified.Test 2 - This test works by attempting to write itself to various autostart locations in the registry. It will then simulate a shutdown to show that it will appear the next time your machine starts. If the test fails to shutdown your computer, then manually shut it down to see the results for the next boot. If this test is successful after the reboot you should receive various messages stating that this test indeed managed to start itself on the next reboot. If the test is successful you are vulnerable to being infected with something which will continually start itself on your system. If your registry protection programs detects the changes AFTER the registry tester starts then it has failed. If this test can get itself to start up again next boot, what is stopping a malicious software doing the same thing?
RegTest Screenshots

Scoundrel Simulator Geek Superhero

Scoundrel Simulator Geek Superhero is a program that's harder to see in action, protecting your computer. With a download manager (like GetRight) you can download a file and see it work. Geek Superhero is more like a virus scanner--where it's hard to really see it work until the virus scanner pops up and says "Hey! I Found a Virus!" I simulate what a virus, trojan, or other malicious program can do to your computer. I'm Geek Superhero's Scoundrel Simulator. With a simple button, you can change (and then fix back!) settings that show some of the nasty things a scoundrel can do to your computer. The things I'll demonstrate:

Changing your browser's home page.

Disabling access to change your Internet Options.

Disabling the registry editing tools that come included in Windows.

Adding new items to start when Windows starts.

These show quite well how Geek Superhero protects you (or if you don't have Geek Superhero, it shows how simple it is for these things to be changed without your knowledge).

This 300kb file is the program itself, it doesn't need any installation. Just download and run. Silly, but McAfee says we could be a site that distributes software that makes questionable changes--because this demonstrates how easy it is to make changes! Copy that address to your web browser to download; hopefully this stops them flagging us as bad!

Spycar

Spycar= Anti-spyware Test

What does Spycar do?
The following links are Spycar. Clicking on each of the links will make Spycar try to take some benign action on your system. When you first run it, Spycar will ask you to name a test profile, a small file where we’ll store state information about a given series of Spycar tests you perform. Then, when you click on each link, Spycar works by pushing a Windows executable to your browser. Currently, Spycar runs only on Windows, and its browser-centric alterations focus on IE, although it can be triggered by any Windows browser (Firefox-altering Spycar modules will be released soon!).

Spycar does not include any exploits, so you must click “OK” in the message that appears in your browser to run the given Spycar function. If, after you click “OK”, your anti-spyware tool blocks the given Spycar action, good for you! If not, this benign alteration will occur. Then, when you have clicked each of these links, you can click on the Results/Clean-Up link to have the Spycar tool called TowTruck automatically measure how your anti-spyware tool did, and to restore your machine to the pre-Spycar settings.

Note that we designed Spycar as a series of different links and associated executables. We did not make it a monolithic one-click-to-conduct-all-actions programs, because an anti-spyware tool may shut down a given program early on in its cycle, without letting Spycar accurately test later modules. That’s why you have to click on each link, giving your anti-spyware tool a fair shot at stopping each individual action.

Intelguardians cannot be held responsible if these files and/or your anti-spyware tool in combination with these files cause any damage to your computer. You download and run these files at your own risk. Download and run these files only if you are sufficiently knowledgeable in the usage of your anti-spyware tool and operating system. Intelguardians cannot and will not provide any help to remove these files or the changes they cause from your computer. Please contact the manufacturer of your anti-spyware tool to seek such help.

• “Spycar change allowed” -- Sorry, but your anti-spyware tool did not block this test. You are not protected against this kind of behavior
• “Spycar change blocked” -- Your anti-spyware tool blocked this test. That’s a good thing.
• “Spycar test not performed” -- Either you did not run this element of Spycar, or your anti-spyware tool blocked it so thoroughly that Spycar cannot even determine that it was run. The former just means you need to do the test. The latter is a good thing.

Добавлено через 43 минуты

UNDETECTABLE KEYLOGGER TEST

As the name states, its undetectable. Its a simple stay-on-top program with a
memo, that displays everything you type. It uses a special system of keylogging,
which is magnificent if i may say so myself, so dont be surprised if your anti-keylogging
software doesnt block it. If you want to test your pc and see if it is truly
protected against spyware, try this. Note to people who think slowly: This is
NOT spyware, it is only intended for testing if your computer is is really immune
to spyware.

Normal popup test:
This test checks to see if your popup blocker can block normal popup windows, which are browser windows that do not have any toolbar, buttons or menus except for a simple titlebar. This test adds 20 points to your popup blocker quality score if this popup is blocked.

Full-screen popup test:
This checks your popup blocker's ability to block a special type of popup window. This window does not have any toolbars, button or menus and covers your entire screen. These are called "full-screen popups" are can only be seen with the Internet Explorer web browser. This test adds 10 points to your score if this popup is blocked.

Channel-opener popup test:
This type of popup launches a full-screen popup but contains a toolbar and can only be seen on the Internet Explorer. Other browsers will just open a normal popup. Adds 5 points to your popup test score.

Modeless dialog popup test:
This popup can only be launched in Internet Explorer and opens a dialog window, not a popup, that forces the user to close it in order to continue working on the web page that opened it. Adds 10 points to your popup test score.

Browser window popup test:
This popup is exactly the same as a normal browser window. Contains menubars, toolbars, and everything else that a normal browser has. This test adds 20 points to your popup test score.

User-launched HREF-method popup test:
The term "user-launched" refers to popup windows that are opened manually by the user. This test checks to see if your browser allows a popup window to be opened from clicking a link. It may think it's a popup and block it. Adds 10 points to your popup test score.

User-launched JavaScript-method popup test:
This test checks your popup blocker's ability to correctly allow popups that open when you click on a link. The popups being opened can be a popup or series of popups that are opened by an instruction called from JavaScript when you click on that link. Adds 10 points to your popup test score.

User-launched OnClick-method popup test:
This test checks if your popup blocker allows popups that open when you click on a HTML object, which usually is a link. Popup windows are opened by detecting when you click on that object. Adds 10 points to your popup test score.

User-launched Delayed-method popup test:
This test is the same as the JavaScript-method popup test, the only difference is that the popup being opened is delayed by a dialog box before it actually opens. Adds 5 points to your popup test score.http://www.auditmypc.com/freescan/popup/popup-test.asp

Download the ZIP file, and extract both the exe and dll to the same folder. No special installation is necessary.
A quick tourZapass Trojan Test

Zapass (ZoneAlarm Pass or more boldly zap-ass) requires Microsoft Windows NT4, 2000 or XP. We went for these platforms as people consider them the most secure. Trojan Implants are even easier on Windows 95, 98 or Me, but not implemented in Zapass.

Zapass consists of a Control Interface (zapass.exe) and an Implant dll (zapass.dll), that should be extracted in the same folder. Apart from these two files, absolutely nothing will be written to your system. At any time, you can completely remove Zapass from your system just by deleting these two files.

Zapass allows to pick whatever running process that qualifies as host. Basically, these are all processes that are not services. You may pick IE, Navigator, even ZoneAlarm, ...
Clicking 'Refresh List' will update the list of host candidates, matching the current open applications.
Clicking 'Inject Implant' will inject the Implant into the selected process. The Implant will respond as soon as it's operational.
Clicking 'Issue Download' will issue a download command to the Implant, downloading the http://www.google.com search page to your c: root folder. The download will occur under the credentials of whatever process that's hosting the Implant. At this point, Zapass accesses the Internet and writes to local resources. If you chose a trusted application as host, ZoneAlarm will not complain.

Try Notepad as host application, and see how ZoneAlarm identifies notepad.exe as the one who attempts to pass.

A real Trojan may automatically pick your default Web browser as host, and then unvisibly upload personal information or open a more permanent connection to a obscure server.
Clicking 'Issue Lifecheck' invokes a roundtrip to the Implant and back. A positive response proves that the Implant is ready and eager to execute commands.
Un-clicking 'Inject Implant' will eject the Implant from the host process, returning it to its unaffected state. (As you may expect, closing the host process will also unload the Implant.)

Nice tests.
It's a pitty for all those pictures on this forum. therefore the thread it is a crime to read

Hi, Sjoeii!

Nice to see you here. If you have Firefox, install the extension ImgLikeOpera and set the default policy to '4' (= don't load images). Then exclude sites where you really want to see the pictures. My policy here is '2' (= load images for this site only).
* First of all, you save a lot on traffic.
* Second, you don't have to see pictures that have nothing to do with the content being discussed. If you really want to see them, just right-click and choose 'Load Image'.

ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.

In only a few minutes ThreatExpert can process a sample and generate a highly detailed threat report with the level of technical detail that matches or exceeds antivirus industry standards such as those normally found in online virus encyclopedias.

ThreatExpert: Introduction
ThreatExpert (patent pending) is an advanced automated threat analysis system (ATAS) designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.

The ThreatExpert system produces reports with the level of technical detail that matches or exceeds antivirus industry standards such as those found in online virus encyclopedias.

It only takes 2-3 minutes for an automation server to process a single threat, making it possible to generate up to 1,000 highly detailed threat descriptions per server, per day. Built on a distributed architecture the service can scale to a virtually unlimited amount of threat analysis servers, thereby allowing unlimited automated processing of threat samples.

The Problem
A typical threat outbreak scenario is illustrated below:

* A new threat slips through an Antivirus Product undetected and penetrates into the Customer's environment
* The customer submits the sample to its Antivirus Vendor for analysis
* It can take many hours for the Antivirus Vendor to provide a response
* Response #1: Antivirus Vendor rolls out definitions to update the Antivirus Product.
* Response #2 (optional): Antivirus Vendor provides the Customer with the threat description

Notes:

* Threat description response (such as a posted write-up) follows the updated detection a several hours (or even days) later
* Due to its complexity, threat description response is only provided for a small percentage of newly discovered threats, such as high-profile threats or threats that are submitted by VIP customers. Note: the majority of new threats are detected under generic names only with no specific description provided thereby removing the possibility of manual mitigation or prevention.

The Solution
Below is the illustration of a scenario when Customer uses ThreatExpert Automation directly:

* Being affected with a new threat, the customer submits the sample both to their current Antivirus Vendor and ThreatExpert
* ThreatExpert provides an immediate detailed threat description analysis
* Threat description can be used by the customer to undertake threat mitigation phase (e.g. automated or manual threat removal or prevention) hours before Antivirus Vendor responds

Below is the illustration of a scenario when Antivirus Vendor uses ThreatExpert Automation to accelerate and improve the quality of its response:

* As soon as the Antivirus Vendor receives a sample from the Customer, it engages ThreatExpert (which could be an in-house server or a hosted server)
* ThreatExpert provides an immediate threat description response
* The new threat description can now be immediately posted on the corporate website of the vendor, hours before other vendors are capable to do so
* Vendor's other Customers can now be immediately alerted about a new threat with the full threat description
* Vendor can use the detailed behavioral report to assist in the malware analysis for generating the detection signature.

The VBSim program is a malware simulation that demonstrates how a computer virus or worm spreads inside and between corporations. The simulation relies upon user-specified parameters, probability functions, and random numbers to model the corporate environment. Because it is a simulation, different outcomes and different infection patterns are generated each time the program runs. The infection patterns can vary widely from one run of the program to another. Although the parameters that have been chosen and the mathematical models used within the simulation are not perfect, they do model the gross behavior of computer viruses and worms. Because this is a simulation governed entirely by random processes, its behavior may not always conform to your expectations. Over many runs of the simulation, however, trends and behaviors will emerge. VBSim was first demonstrated at the 1999 Virus Bulletin conference in Vancouver, Canada. The Symantec AntiVirus Research Center continues to update and work with models such as VBSim to help advance antivirus research.

The new Symantec Worm Simulator visually demonstrates how worms spread through the Internet, and how they fare against a custom network and security policy.

The Worm Simulator is a substantially updated version of the VBSim program released in 1997. VBSim was the first program to “show” the spread of a virus to Symantec customers. The new Worm Simulator takes VBSim to another level, enabling custom configuration of new worm simulations, configuration of custom networks and protection policy, and incorporates impressive new three-dimensional graphics

These Virus Simulator programs generate safe and sterile, controlled test suites of sample virus programs. Virus Simulator's ability to harmlessly compile and infect with safe viruses, is valuable for demonstrating and evaluating anti-virus security measures without harm or contamination of the system. The infected programs can be used as bait for virus detecting programs to gain practical virus protection experience.

Are your security applications vulnerable to termination attacks? Security programs are useless if they aren't running, yet it's so easy for malicious software to terminate them unless they're protected by a kernel-level process protection system like ProcessGuard.

DiamondCS Advanced Process Manipulation (APM) is an advanced process/module viewer and manipulation utility that allows unique control over target processes by literally becoming a part of them.

Take control of a process by becoming a part of it ...
Unlike conventional process viewers, DiamondCS APM doesn't control processes by remotely sending them instructions. Instead, APM safely attaches a part of itself to the target process, essentially becoming a part of that process. Once 'inside', APM is free to perform actions on behalf of the target process. For example, if it calls the ExitProcess API function, the target process terminates.

Control processes in ways that aren't conventionally possible ...
Because of this 'insider' nature, APM is able to do some remarkable things that aren't otherwise possible. For example, it can unload and load DLLs into the target process (allowing you to make plugins for virtually any program). It can even determine which ports the target process is using. APM has even proven its unique anti-trojan capabilities here in our lab by disinfecting an explorer.exe-infecting usermode-rootkit trojan from a test machine. It also serves as a useful way to see which modules are loaded in each process!

Overview
Security is only as good as the measure of stress you apply to it. To this end the "DFK Threat Simulator" was created. Bundling a de-clawed collection of dropper, rootkit, exploit, virus, trojan, spyware, keylogger, leaktest, process termination, action automation, and alternate data stream technology, the updated version 2 of the DFK Threat Simulator is a serious representation of the modern dangers facing computer users today.
Because it is far easier to destroy than to build, the true victors in the digital arms race (and this simulation) are the white-hat men and women in the security industry tirelessly facing mounting odds and innumerable fronts to keep our computers safe. No effort is wasted - Keep up the good fight!

Attention: By agreeing to perform the following PC vulnerability test, you will become subject to our “Cyber Attack”. This is only a demonstration and no actual damage will be caused to your PC or network.

We will, however, simulate a malicious file received, for example, via the Web, as an email attachment, from a memory stick, or from any other path by which an executable file can enter your system. We will attempt to prove that none of your security systems will identify or alert you to our intrusion attempt.

Step 1: Run our .exe Vulnerability Test File
As you run our .exe file, we will demonstrate how hackers can do as they like on your PC:

D. We will then place your sensitive file names (names only!) on our server. During the
process, your firewall may notify you of our demo trying to access the network; this means
that our demo has successfully accessed your system and is trying to report its findings to
our server.

Step 2: View your PC’s Vulnerability Test results
If you allow our Vulnerability Test File to connect to the Internet, you will receive a link that enables you to view your PC’s Vulnerability Test results. As soon as you refresh that Web page, the information we were able to collect from your PC will be immediately and automatically erased from our servers.

is a self contained tool that will let you practice virus attacks and recover from them, in a realistic yet safe environment. AVPL is the perfect tool for hands-on training for system administrators, security experts and power users with an interest in the field.

Download the Anti-Virus Practice Lab - AVPL here.

AVPL is designed to be used with InVircible. However, it can also be used to evaluate antivirus products in general.

AVPL is a significant contribution to the tools available to end-users who have previously been unable to evaluate the key features of an antivirus package.

In order for computer user's to appreciate the significant effectiveness of a generic, rule-based, expert system's approach, it is necessary for them to become familiar with how viruses operate in a computer. A major purpose of AVPL is to provide computer users with a near-real virus environment so that they may increase their familiarity with the types of actions that viruses perform.

AVPL allows an individual to "infect" selected computer programs in a virus like way, to install master boot sector (MBR) infectors to the hard disk, and to use the AV product of their choice to identify the simulated viruses and recover from them.

How "safe" is the AV Practice Lab?
Several points need to be emphasized. First, the "infections" produced by AVPL are ultimately harmless. The scenarios created by AVPL will not replicate. They can not spread through a process of spontaneous replication to other programs or disks. They will only affect the program files in a target directory selected by the user and the hard drive of the system on which AVPL is installed. Therefore, the user can be assured that only those programs and the hard disk of their system can be practiced upon with AVPL. AVPL will ONLY affect program files and the hard drive chosen by the user.

Programs that are affected by AVPL can be "cleaned" either through the use of the Uninstall option of AVPL, or through the DOS delete command.

MBR infections that were installed by AVPL can be removed as well by AVPL's Uninstall option, or through the use of the InVircible ResQ diskette.

Note: It's highly recommended to download, install InVircible and prepare its ResQ diskette before starting to practice with AVPL.

D. We will then place your sensitive file names (names only!) on our server. During the process, your firewall may notify you of our demo trying to access the network; this means that our demo has successfully accessed your system and is trying to report its findings to our server.

Step 2: View your PC’s Vulnerability Test results
If you allow our Vulnerability Test File to connect to the Internet, you will receive a link that enables you to view your PC’s Vulnerability Test results. As soon as you refresh that Web page, the information we were able to collect from your PC will be immediately and automatically erased from our servers.

Well, ladies and gentlemen: Here are the results of my VEEEEEEERY private data on their server (see screen shot): a white page, even with scripts enabled for their domain...

This is FUD, nothing more. You see: no security installed and obviously not needed either against this kind of 'attacks'...
P.S.1: Judging by the ip-address, it got stuck somewhere and didn't even get home.
P.S.2: Never trust anything that has 'Trust' in its name... (Just kidding)

Default Download real rootkit samples for testing
These rootkit downloads are being provided so you can test rootkit detection software in a controlled environment. Under no circumstances is it recommended that you try to run them on and production systems.

RegHide demonstrates how the Native API can be used to create object names that are inaccessible from the Win32 API. While there are many different ways to do this, the method used here it to include a terminating NULL that is explicitly made part of the key name. There is no way to describe this with the Win32 API, which treats a NULL as the end of the name string and will therefore chop it. Thus, Regedit and Regedt32 won't be able to access this key, though it will be visible